“Until now, publicly known details of the attack were largely limited to its use of a self-injecting rootkit—Phalanx or Phalanx2—to infect kernel.org servers known as Hera and Odin1, as well as personal computers belonging to senior Linux developer H. Peter Anvin. The malware had access to potentially sensitive information stored on the infected machines. A follow-up advisory a few weeks later opened the possibility that still other developers may have fallen prey to the attackers. According to Eset, kernel.org servers were probably infected by a second piece of malware dubbed Linux/Ebury, an OpenSSH backdoor used to keep control of the servers and steal credentials.”
(Visited 37 times, 1 visits today)
Related posts:
U.S. military judge: ‘Torture’ is not ‘relevant’ in Guantanamo cases
IRS Needs AR-15's For "Standoff Capabilities"?
‘Show Us the Tapes!’: Activists March to Demand Release of Paddock Video
Silicon Valley VC Thinks a Single Bitcoin Will Be Worth $100,000
US Files Criminal Charges Against SAC For the Non-Crime Of Insider Trading
John Hussman: Memorize This, Earn a Dollar
FBI Claims RT Founder Beat Himself To Death In His Hotel Room In 2015
Oklahoma residents, officials, experts support medical marijuana
Oregon election worker fired for altering ballots to Republican straight ticket
‘Without third party bitcoin is safer than Fed notes’
Philadelphia Eagles Player Photographed Peeing on IRS Sign
Trump Attorney General: "Good People Don't Smoke Marijuana"
The Bush Dynasty Continues
Justin Raimondo: What the Oregon Standoff Is Really About
Hedge Fund Borrows $10M in Stock Via the Bitcoin Blockchain